I will conduct a professional vulnerability assessment of your website, server, or cloud application. Note that I will not attempt to gain access to the IT system without the customer's consent.
SENSITIVE/PERSONAL INFORMATION WILL NOT BE VIEWED OR ACCESSED.
I will identify any known vulnerabilities in accordance with the CVE database. Also, I will provide a written report of my actions that will recommend solutions.